Database Security 40734 
  CE Department- Sharif University of Technology 2 - Group 1 

  Main Menu
   Home
   Syllabus
   Assignments
   Grades
   Calendar
   Discussion Area
   Links
   Resources


Announcments

  1387-06-03 August 24, 2008 08:43 AM  
Detail Grades
You can find your grades in "Grades" page. You can refer to Dr Jalili to see your papers in Saturday (87-06-03) at 10-12 am and Tuesday (87-06-05) at 10-12 am.

  1387-05-28 August 18, 2008 08:52 AM  
Grades of Final Exams & Research Projects
You can find your grades in "Grades" page. If you have any objection on your grades, let me know.

  1387-04-24 July 14, 2008 09:49 AM  
Research Paper Presentations Timetable: Tuesday (87/4/25)
It will be held in two parallel sessions in rooms Study 1 and Study 2.
All students are supposed to participate in one of the sessions.
Please find your presentation time in one of the following sessions:
 - Timetable of Session 1
 - Timetable of Session 2

  1387-04-16 July 06, 2008 02:41 PM  
Final Paper Submission Deadline
The deadline is Sunday 87-04-23 by 23:59 pm.
The deadline is firm and it will NOT be extended.

Final Paper Presentation
The oral presentation session of the final papers will be held in 87-04-25 (8.00 am).
The presentations timetable will be announced next week.

  1387-03-23 June 12, 2008 05:40 PM  
The slides of Jajodia & Sandhu Model have been uploaded!

  1387-03-22 June 11, 2008 11:03 AM  
Final Exam Contents:
All presented lectures except Oracle Security and SQL Injection Attacks. In other words, it includes the following:
1- Access Control Models (First to Last: DAC + MAC + Lattice-based MAC + RBAC + ORION)
2- ARBAC
3- Statistical Databases Security
4- Database Security Design
5- Query on Encrypted Databases
6- Hippocratic Databases (Privacy in DBs)

  1387-03-22 June 11, 2008 08:54 AM  
The lecture notes of the course are uploaded! Just Jajodia's slides and SQL-Injection are remained.

  1387-02-14 May 03, 2008 04:15 PM  
Deadline of First Progress Report of Research Project:  87/2/15 23:59extended to 87/2/20 23:59

You should prepare your report in at least 3 pages and at most 6 pages and it is supposed to cover the following parts:
1- Abstract
2- Introduction
3- Related Work
4- Your Proposal
5- Conclusion
6- References
In this step you should concentrate on surveying other similar research and propose your ideas and contributions for completing your research activity. In the next step you should prepare a complete paper resulted from your research with more focus on your contributions and present it in class.
Please prepare your report following the ISCISC2008 conference's templates in Farsi or in English and send your reports before the deadline to m_amini@ce.sharif.edu with [DBSec:Progress Report] subject.

  1387-01-20 April 08, 2008 10:53 AM  
Mid-Term Exam

Mid-term exam will be taken on Sunday 87-02-01.
The content covered in the exam will be announced later.

  1387-01-20 April 08, 2008 10:33 AM  
First assignment deadline has been extended to Sunday 87-01-25.

  1387-01-08 March 27, 2008 02:11 PM  
Lecture notes of Introduction, DAC Models, and MAC Models have been uploaded ! Find them in Resources/LectureNotes page.

  1387-02-10 April 29, 2008 12:42 PM  
Received Research Proposals:
1- Omid Ahmadi Darani, Access Control with Cryptography on Outsourcing Data
2- Mohammad Sadegh Dousti, and Maryam Amir-Haeri, Protecting Data Privacy against Data Mining Classification
3- Tayyebeh Shafiei, and FAtemeh Shirzad, Inference Control in New Generation of Databases (the proposal need to be revised)
4- Mojtaba Nouri, Security in Semantic Web (the proposal need to be revised)
5- Hassan Kafi Mousavi, Content-Aware Access Control Mechanisms (the proposal need to be revised)
6- Maryam Karimi, and Negar Hariri, Search on Encrypted Data without Initial Decryption
7- Seyyedeh Mina Doroud, Database Watermarking for Copyright Protection
8- Fathieh Faghih, Modal Description Logic based Access Control Model
9- Hadi Forghani, Security in Object-Oriented Databases
10- Asghar Asl-ASgharian, Formal Approaches in Analysis of Security Protocols (the proposal has been rejected)
11- Sadegh Dorri, Security Requirements and Security Mechanisms in Grids with Emphasis on Access Control
12- Teyyebeh Shafiei, Fatemeh Shirzad, Inference Control in Object-Oriented Databases

Please let me know , if somebody sent a proposal but it is not appeared here.

  1387-01-07 March 26, 2008 04:26 PM  
Happy New Year !

  1386-12-20 March 10, 2008 11:27 AM  
First Assignment's file had a problem. It has been uploaded again.

  1386-12-14 March 04, 2008 11:03 AM  
First Assignment
First assignment has been uploaded. Find it on Assignments page.

  1386-12-14 March 04, 2008 10:36 AM  
Research Project
Research plan has been uploaded (in Resources/Research folder). Please consider the deadlines.

  1386-12-14 March 04, 2008 11:03 AM  
Text Book Corrigendum
The text book has some mistakes. You can correct your book based on the followings. This note will be completed gradually.
     -------------------------------------------------------------------------
     P: Page S: Section L: Line T: Table F: Figure
     -------------------------------------------------------------------------
     P 44 - S 2.2.1 - L 14: ( S is subset of O )
     -------------------------------------------------------------------------
     P 46 - T 2.3 - Third Column - L 13: ( A'[s,si]=...... )
     -------------------------------------------------------------------------
     P 48 - L 20: ( if O in A[owner, file] )
     -------------------------------------------------------------------------
     P 50 - S 2.2.6: ( The title should be changed to 'Implementation based on the Model' )
     -------------------------------------------------------------------------
     P 64 - L 5: ( The sentence "..., the arc is barred." should be changed to "..., the arc is crossed." )
     -------------------------------------------------------------------------
     P 65 - L 9: ( "the dynamic action" should be changed to "the static action" )
     -------------------------------------------------------------------------
     P67 - From bottom L 9: ( ".. potentiality of Ej ..." should be changed to "... potentiality of Ez ..." )
     -------------------------------------------------------------------------
     P 68 - Number (2): ( "If an authorization Aij" should be changed to "If an authorization Ajk" )
     -------------------------------------------------------------------------
     P 68 - Number (3): ( "The static action SA ..." should be changed to "The static action SA' ..." )
     -------------------------------------------------------------------------
     P 71 - Rule M.3 - L 2: ( "Aij" should be changed to "Aik" )
     -------------------------------------------------------------------------
     P 75 - S 2.5.4 - L 8: ( in the right side of the formula, "Tc*C" should be changed to "P(Tc*C)" )
     -------------------------------------------------------------------------
     P 75 - S 2.5.4 - L 10: ( in the right side of the formula, "<... , ...>" should be changed to "{<... , ...>}" )
     -------------------------------------------------------------------------

  1386-12-14 March 04, 2008 10:33 AM  
The course mailing list is ready. Please subscribe yourself in Databsae Security Mailing List !

  1386-12-14 March 04, 2008 10:38 AM  
Happy New Semester!

Please read the followings to warm up for the course:
- Matt Bishop, “Computer Security: Art and Science”, Addison Wesley, 2003. (Chapter one)
- Elisa Bertino and Ravi Sandhu: Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable and Secure Computing 2(1): 2-19, 2005.

You can find them in (Resources/Course Reference Papers) page !

Instructor:
Dr. Rasool Jalili
(jalili [AT] sharif [DOT] edu)

3 Units
10.30 am - 12.00 am (Sun & Thu)
Room: Khodro 206

 This website is visited 8286 times since March 2008. Updated Monday 2015-04-06 11:27